none
Task Sequence Deployment RRS feed

  • Question

  • Hello,

    I have a task sequence with two steps for now:

    - Uninstall Application A

    - Install Application B

    Which log could explain the progress of this Task.

    10019 seems to be Program Expired... where could I get more details?

    Thanks,
    Dom


    Security / System Center Configuration Manager Current Branch / SQL

    Monday, December 9, 2019 11:32 PM

All replies

  • As with all task sequences, smsts.log. Task sequence initiation is recorded in execmgr.log.


    Jason | https://home.configmgrftw.com | @jasonsandys

    Tuesday, December 10, 2019 1:22 AM
  • Hi,

    Yes, the Message ID 10019 means "Program expired". Please look at the specific deployment and check the scheduling tab.

    For more detailed information, please check the Smsts.log, Execmgr.log, CAS.log and Distmgr.log.

    Thanks for your time.

    Best regards,
    Simon

    Please remember to mark the replies as answers if they help.
    If you have feedback for TechNet Subscriber Support, contact tnmff@microsoft.com.

    Tuesday, December 10, 2019 2:23 AM
  • As with all task sequences, smsts.log. Task sequence initiation is recorded in execmgr.log.


    Jason | https://home.configmgrftw.com | @jasonsandys

    Hello,

    I was looking for this file smsts.log but could not find it..

    As the SCCM Agent is installed I was checking:  
    C:\_SMSTaskSequence\logs\smstslog\ does not exist
    C:\Windows\System32\CCM does not exist
    C:\Windows\SysWOW64\CCM is empty

    Thanks,

    Dom


    Security / System Center Configuration Manager Current Branch / SQL

    Tuesday, December 10, 2019 2:50 AM
  • Hi,

    Yes, the Message ID 10019 means "Program expired". Please look at the specific deployment and check the scheduling tab.

    For more detailed information, please check the Smsts.log, Execmgr.log, CAS.log and Distmgr.log.

    Thanks for your time.

    Best regards,
    Simon

    Please remember to mark the replies as answers if they help.
    If you have feedback for TechNet Subscriber Support, contact tnmff@microsoft.com.

    Hello,

    For smsts.log I could not find it...

    Execmgr:

    Auto Install is set to false. Do Nothing.	                                execmgr	12/7/2019 12:00:00 AM	2608 (0x0A30)
    CServiceWindowEventHandler::Execute - Received SERVICEWINDOWEVENT : END Event	execmgr	12/8/2019 12:00:00 AM	560 (0x0230)
    CServiceWindowEventHandler::Execute - Received SERVICEWINDOWEVENT : START Event	execmgr	12/8/2019 12:00:00 AM	560 (0x0230)
    CExecutionRequestManager::OnServiceWindowEvent for START           	        execmgr	12/8/2019 12:00:00 AM	560 (0x0230)
    Auto Install is set to false. Do Nothing.	                                execmgr	12/8/2019 12:00:00 AM	560 (0x0230)
    CServiceWindowEventHandler::Execute - Received SERVICEWINDOWEVENT : END Event	execmgr	12/9/2019 5:00:00 AM	14180 (0x3764)
    A user has logged on.	                                                        execmgr	12/9/2019 10:56:23 AM	6432 (0x1920)
    The logged on user is AD\xxxxxx	                                                execmgr	12/9/2019 10:56:23 AM	6432 (0x1920)
    This machine is not a workstation, returning false for MDMIsExternallyManaged.	execmgr	12/9/2019 10:56:23 AM	6432 (0x1920)
    The user has logged off.	                                                execmgr	12/9/2019 1:22:33 PM	10528 (0x2920)
    Execution Manager timer has been fired.	                                        execmgr	12/9/2019 1:23:33 PM	15856 (0x3DF0)

    CAS.log

    ===== CacheManager: Initializing cache state from Wmi. =====	ContentAccess	11/13/2019 6:54:16 PM	4024 (0x0FB8)
    Cache size is 5120 MB.  Location is C:\Windows\ccmcache	ContentAccess	11/13/2019 6:54:16 PM	4024 (0x0FB8)
    CacheManager: MaxCacheDuration:43200 - MinTombstoneDuration:1440	ContentAccess	11/13/2019 6:54:16 PM	4024 (0x0FB8)
    CacheManager: There are currently 5975598080 bytes used for cached content items (22 total, 0 active, 22 tombstoned, 0 expired).	ContentAccess	11/13/2019 6:54:16 PM	4024 (0x0FB8)
    ===== CacheManager: Cache state initialization completed =====	ContentAccess	11/13/2019 6:54:16 PM	4024 (0x0FB8)

    nothing for 26 days...

    distrmgr.log

    Found package properties updated notification for package 'UCP00505' SMS_DISTRIBUTION_MANAGER 12/9/2019 2:17:06 PM 2624 (0x0A40) Adding package 'UCP00505' to package processing queue. SMS_DISTRIBUTION_MANAGER 12/9/2019 2:17:11 PM 2624 (0x0A40) Currently using 0 out of 5 allowed package processing threads. SMS_DISTRIBUTION_MANAGER 12/9/2019 2:17:11 PM 2624 (0x0A40) Started package processing thread for package 'UCP00505', thread ID = 0x446C (17516) SMS_DISTRIBUTION_MANAGER 12/9/2019 2:17:11 PM 2624 (0x0A40) Sleep 1215 seconds... SMS_DISTRIBUTION_MANAGER 12/9/2019 2:17:11 PM 2624 (0x0A40) STATMSG: ID=2300 SEV=I LEV=M SOURCE="SMS Server" COMP="SMS_DISTRIBUTION_MANAGER"

    SYS=VRPSCCMPR01.AD.MEDCTR.UCLA.EDU SITE=UCP PID=8368 TID=17516

    GMTDATE=Mon Dec 09 22:17:11.859 2019 ISTR0="ISS - Server - Remove ECAT - Install AMP"

    ISTR1="UCP00505" ISTR2="" ISTR3="" ISTR4="" ISTR5="" ISTR6="" ISTR7="" ISTR8=""

    ISTR9="" NUMATTRS=1 AID0=400 AVAL0="UCP00505" SMS_DISTRIBUTION_MANAGER 12/9/2019 2:17:11 PM 17516 (0x446C) Processing package UCP00505 (SourceVersion:1;StoredVersion:1) SMS_DISTRIBUTION_MANAGER 12/9/2019 2:17:11 PM 17516 (0x446C) Start updating the package UCP00505... SMS_DISTRIBUTION_MANAGER 12/9/2019 2:17:11 PM 17516 (0x446C) The Package Action is 1, the Update Mask is 8192 and UpdateMaskEx is 0. SMS_DISTRIBUTION_MANAGER 12/9/2019 2:17:11 PM 17516 (0x446C) Package UCP00505 doesn't have a source directory. SMS_DISTRIBUTION_MANAGER 12/9/2019 2:17:11 PM 17516 (0x446C) Successfully created/updated the package UCP00505 SMS_DISTRIBUTION_MANAGER 12/9/2019 2:17:11 PM 17516 (0x446C) STATMSG: ID=2311 SEV=I LEV=M SOURCE="SMS Server" COMP="SMS_DISTRIBUTION_MANAGER"

    SYS=VRPSCCMPR01.AD.MEDCTR.UCLA.EDU SITE=UCP PID=8368 TID=17516 GMTDATE=Mon Dec 09 22:17:11.899

    2019 ISTR0="UCP00505" ISTR1="" ISTR2="" ISTR3="" ISTR4="" ISTR5="" ISTR6="" ISTR7=""

    ISTR8="" ISTR9="" NUMATTRS=1 AID0=400 AVAL0="UCP00505" SMS_DISTRIBUTION_MANAGER 12/9/2019 2:17:11 PM 17516 (0x446C) GetContentLibLocation - VRPSCCMPR01.ad.medctr.ucla.edu SMS_DISTRIBUTION_MANAGER 12/9/2019 2:17:11 PM 17516 (0x446C) Finished GetContentLibLocation - VRPSCCMPR01.ad.medctr.ucla.edu SMS_DISTRIBUTION_MANAGER 12/9/2019 2:17:11 PM 17516 (0x446C) Updating the content library for 0 DPs with package flags value 0x0. SMS_DISTRIBUTION_MANAGER 12/9/2019 2:17:11 PM 17516 (0x446C) Finished processing package flag updates for DPs SMS_DISTRIBUTION_MANAGER 12/9/2019 2:17:11 PM 17516 (0x446C) Created policy provider trigger for ID UCP00505 SMS_DISTRIBUTION_MANAGER 12/9/2019 2:17:11 PM 17516 (0x446C) All DP threads have completed for package UCP00505 processing thread. SMS_DISTRIBUTION_MANAGER 12/9/2019 2:17:11 PM 17516 (0x446C) Package UCP00505 does not have a preferred sender. SMS_DISTRIBUTION_MANAGER 12/9/2019 2:17:13 PM 17516 (0x446C) A program for package UCP00505 has changed, therefore it needs to be replicated to all

    child sites. SMS_DISTRIBUTION_MANAGER 12/9/2019 2:17:13 PM 17516 (0x446C) Package UCP00505 is new or has changed, replicating to all applicable sites. SMS_DISTRIBUTION_MANAGER 12/9/2019 2:17:13 PM 17516 (0x446C) CDistributionSrcSQL::UpdateAvailableVersion PackageID=UCP00505, Version=1, Status=2301 SMS_DISTRIBUTION_MANAGER 12/9/2019 2:17:13 PM 17516 (0x446C) StoredPkgVersion (1) of package UCP00505. StoredPkgVersion in database is 1. SMS_DISTRIBUTION_MANAGER 12/9/2019 2:17:13 PM 17516 (0x446C) SourceVersion (1) of package UCP00505. SourceVersion in database is 1. SMS_DISTRIBUTION_MANAGER 12/9/2019 2:17:13 PM 17516 (0x446C) STATMSG: ID=2301 SEV=I LEV=M SOURCE="SMS Server" COMP="SMS_DISTRIBUTION_MANAGER"

    SYS=VRPSCCMPR01.AD.MEDCTR.UCLA.EDU SITE=UCP PID=8368 TID=17516 GMTDATE=Mon Dec 09 22:17:13.176

    2019 ISTR0="ISS - Server - Remove ECAT - Install AMP" ISTR1="UCP00505" ISTR2="" ISTR3="" ISTR4=""

    ISTR5="" ISTR6="" ISTR7="" ISTR8="" ISTR9="" NUMATTRS=1 AID0=400 AVAL0="UCP00505" SMS_DISTRIBUTION_MANAGER 12/9/2019 2:17:13 PM 17516 (0x446C) Exiting package processing thread for package UCP00505. SMS_DISTRIBUTION_MANAGER 12/9/2019 2:17:13 PM 17516 (0x446C) Currently using 0 out of 5 allowed package processing threads. SMS_DISTRIBUTION_MANAGER 12/9/2019 2:17:16 PM 2624 (0x0A40)

    Some errors in this log to be reviewed...

    Package UCP00505 doesn't have a source directory.

    I ran the command line manually and the file uninstall.log has been created... so I think the package is not distributed at all..

    Thanks,

    Dom


    Security / System Center Configuration Manager Current Branch / SQL

    • Edited by Felyjos Tuesday, December 10, 2019 5:06 AM
    Tuesday, December 10, 2019 2:56 AM
  • distmgr.log and cas.log are about content download and have nothing to do with deployment's status of expired.

    If there is no smsts.log and execmgr.log has no record of the TS, then it's never been tried which makes sense if the program is expired. What's in the TS is irrelevant for this.

    Did you configure an expiration date on the TS's deployment?


    Jason | https://home.configmgrftw.com | @jasonsandys

    Tuesday, December 10, 2019 2:21 PM
  • Hello,

    Yes the TS's deployment expiration date is set to 2 hours after the availability schedule.

    Thanks,
    Dom


    Security / System Center Configuration Manager Current Branch / SQL

    Tuesday, December 10, 2019 2:50 PM
  • Well, that's your answer then.

    Jason | https://home.configmgrftw.com | @jasonsandys

    Tuesday, December 10, 2019 3:35 PM
  • A task sequence is one option but you could just use supercedence.

    If the original application has an uninstall set correctly then just setup supercedence and tick the box to uninstall the old product. When you then deploy the new application out the uninstall will first run of the old application. You can even set it to reboot between if required via the return codes tab of the old application.

    Or you could add your uninstall command to the first line of your bat file on the new install and just send out the new install with nothing else.


    Richard Knight | Collection Refresh Manager | Automate detection rules for patch \ msp files | Twitter


    Tuesday, December 10, 2019 4:44 PM
  • Hello,

    Good Catch with no expiration date/time the first step is on-going!

    Checking the logs:

    ExecMgr.log

    Auto Install is set to false. Do Nothing. execmgr 12/9/2019 10:00:00 PM 6972 (0x1B3C) CServiceWindowEventHandler::Execute - Received SERVICEWINDOWEVENT : END Event execmgr 12/10/2019 5:00:00 AM 8204 (0x200C) Policy deleted for advertisement UCP2028D package UCP00505 program * execmgr 12/10/2019 7:07:28 AM 11640 (0x2D78) Raising client SDK event for class CCM_Program, instance CCM_Program.PackageID="UCP00505",ProgramID="*", actionType 45l, value NULL, user NULL, session 4294967295l, level 0l, verbosity 30l execmgr 12/10/2019 7:07:28 AM 11640 (0x2D78) This machine is not a workstation, returning false for MDMIsExternallyManaged. execmgr 12/10/2019 7:07:36 AM 6440 (0x1928) This machine is not a workstation, returning false for MDMIsExternallyManaged. execmgr 12/10/2019 7:07:36 AM 11640 (0x2D78) Policy arrived for parent package UCP00505 program * execmgr 12/10/2019 7:07:36 AM 11640 (0x2D78) Raising client SDK event for class CCM_Program, instance CCM_Program.PackageID="UCP00505",ProgramID="*", actionType 6l, value NULL, user NULL, session 4294967295l, level 0l, verbosity 30l execmgr 12/10/2019 7:07:36 AM 11640 (0x2D78) Raising event: [SMS_CodePage(437), SMS_LocaleID(1033)] instance of SoftDistProgramOfferReceivedEvent { AdvertisementId = "UCP2028E"; ClientID = "GUID:4FA25F8D-BC8F-4FB1-B356-208711D5EAB6"; DateTime = "20191210150736.635000+000"; MachineName = "CHSSCCMDP01"; ProcessID = 5176; SiteCode = "UCP"; ThreadID = 11640; }; execmgr 12/10/2019 7:07:36 AM 11640 (0x2D78) Raising client SDK event for class NULL, instance NULL, actionType 6l, value , user NULL, session 4294967295l, level 0l, verbosity 30l execmgr 12/10/2019 7:07:36 AM 6440 (0x1928) Mandatory execution requested for program * and advertisement UCP2028E execmgr 12/10/2019 7:07:36 AM 8516 (0x2144) Creating mandatory request for advert UCP2028E, program *, package UCP00505 execmgr 12/10/2019 7:07:36 AM 8516 (0x2144) This machine is not a workstation, returning false for MDMIsExternallyManaged. execmgr 12/10/2019 7:07:36 AM 8516 (0x2144) Execution Request for advert UCP2028E package UCP00505 program * state change from NotExist to WaitingDependency execmgr 12/10/2019 7:07:36 AM 8516 (0x2144)

    Raising client SDK event for class CCM_Program, instance CCM_Program.PackageID="UCP00505",ProgramID="*", actionType 1l, value , user NULL, session 4294967295l, level 0l, verbosity 30l    execmgr    12/10/2019 7:07:36 AM    8516 (0x2144)
    Requesting content from CAS for package Content_a9abe093-17d0-4e82-a266-9a984c30cdf9 version 1    execmgr    12/10/2019 7:07:36 AM    8516 (0x2144)
    Successfully created a content request handle {534768A5-778D-4C9D-A989-D5A1F2F1ED39} for the package Content_a9abe093-17d0-4e82-a266-9a984c30cdf9 version 1    execmgr    12/10/2019 7:07:36 AM    8516 (0x2144)
    Raising event:
    [SMS_CodePage(437), SMS_LocaleID(1033)]
    instance of SoftDistWaitingContentEvent
    {
        AdvertisementId = "";
        ClientID = "GUID:4FA25F8D-BC8F-4FB1-B356-208711D5EAB6";
        DateTime = "20191210150737.000000+000";
        MachineName = "CHSSCCMDP01";
        PackageName = "";
        PackageVersion = "";
        ProcessID = 5176;
        ProgramName = "";
        SiteCode = "UCP";
        ThreadID = 8516;
    };
        execmgr    12/10/2019 7:07:37 AM    8516 (0x2144)
    Successfully raised SoftDistWaitingContentEvent event for member program     execmgr    12/10/2019 7:07:37 AM    8516 (0x2144)
    Execution Request for advert UCP2028E package UCP00505 program * state change from WaitingDependency to WaitingContent    execmgr    12/10/2019 7:07:37 AM    8516 (0x2144)
    Raising client SDK event for class CCM_Program, instance CCM_Program.PackageID="UCP00505",ProgramID="*", actionType 1l, value , user NULL, session 4294967295l, level 0l, verbosity 30l    execmgr    12/10/2019 7:07:37 AM    8516 (0x2144)
      Processing [{534768A5-778D-4C9D-A989-D5A1F2F1ED39}, 0]: OnContentAvailable     execmgr    12/10/2019 7:07:37 AM    9964 (0x26EC)
    This machine is not a workstation, returning false for MDMIsExternallyManaged.    execmgr    12/10/2019 7:07:37 AM    9964 (0x26EC)
    [{00000000-0000-0000-0000-000000000000}]: Content Version  is available for advert UCP2028E, pkg: UCP00505, program *.    execmgr    12/10/2019 7:07:37 AM    9964 (0x26EC)
    Execution Request for advert UCP2028E package UCP00505 program * state change from WaitingContent to WaitingDependency    execmgr    12/10/2019 7:07:37 AM    9964 (0x26EC)
    Raising client SDK event for class CCM_Program, instance CCM_Program.PackageID="UCP00505",ProgramID="*", actionType 1l, value , user NULL, session 4294967295l, level 0l, verbosity 30l    execmgr    12/10/2019 7:07:37 AM    9964 (0x26EC)
    An existing MTC token was not supplied, using ExecutionRequest's Id as MTC token and this execution request is the owner of resultant MTC task.    execmgr    12/10/2019 7:07:37 AM    9964 (0x26EC)
    Request a MTC task for execution request of package UCP00505, program * with request id: {1C7CE3F9-E27C-41E5-9A50-0C7E5C7AFA58}    execmgr    12/10/2019 7:07:37 AM    9964 (0x26EC)
    Execution Request for advert UCP2028E package UCP00505 program * state change from WaitingDependency to Ready    execmgr    12/10/2019 7:07:37 AM    9964 (0x26EC)
    MTC task with id {1C7CE3F9-E27C-41E5-9A50-0C7E5C7AFA58}, changed state from 0 to 4    execmgr    12/10/2019 7:07:37 AM    11640 (0x2D78)
    Raising client SDK event for class CCM_Program, instance CCM_Program.PackageID="UCP00505",ProgramID="*", actionType 1l, value , user NULL, session 4294967295l, level 0l, verbosity 30l    execmgr    12/10/2019 7:07:37 AM    9964 (0x26EC)
      Processing [{534768A5-778D-4C9D-A989-D5A1F2F1ED39}, 0]: RemoveNotification    execmgr    12/10/2019 7:07:37 AM    9964 (0x26EC)
    This machine is not a workstation, returning false for MDMIsExternallyManaged.    execmgr    12/10/2019 7:07:37 AM    11640 (0x2D78)
    MTC signaled SWD execution request with program id: *, package id: UCP00505 for execution.    execmgr    12/10/2019 7:07:37 AM    11640 (0x2D78)
    Sending ack to MTC for task with id: {1C7CE3F9-E27C-41E5-9A50-0C7E5C7AFA58}    execmgr    12/10/2019 7:07:37 AM    11640 (0x2D78)
    Executing program  in Admin context    execmgr    12/10/2019 7:07:37 AM    11640 (0x2D78)
    Execution Request for advert UCP2028E package UCP00505 program * state change from Ready to NotifyExecution    execmgr    12/10/2019 7:07:37 AM    11640 (0x2D78)
    Raising client SDK event for class CCM_Program, instance CCM_Program.PackageID="UCP00505",ProgramID="*", actionType 1l, value , user NULL, session 4294967295l, level 0l, verbosity 30l    execmgr    12/10/2019 7:07:37 AM    11640 (0x2D78)
    Executing program as a task sequence.    execmgr    12/10/2019 7:07:37 AM    11640 (0x2D78)
    Executing TS Program    execmgr    12/10/2019 7:07:37 AM    11640 (0x2D78)
    Task Sequence started    execmgr    12/10/2019 7:07:37 AM    11640 (0x2D78)
    Raising event:
    [SMS_CodePage(437), SMS_LocaleID(1033)]
    instance of SoftDistProgramStartedEvent
    {
        AdvertisementId = "UCP2028E";
        ClientID = "GUID:4FA25F8D-BC8F-4FB1-B356-208711D5EAB6";
        CommandLine = "";
        DateTime = "20191210150737.750000+000";
        MachineName = "CHSSCCMDP01";
        PackageName = "UCP00505";
        ProcessID = 5176;
        ProgramName = "*";
        SiteCode = "UCP";
        ThreadID = 11640;
        UserContext = "NT AUTHORITY\\SYSTEM";
        WorkingDirectory = "C:\\Windows\\system32\\";
    };
        execmgr    12/10/2019 7:07:37 AM    11640 (0x2D78)
    Raised Program Started Event for Ad:UCP2028E, Package:UCP00505, Program: *    execmgr    12/10/2019 7:07:37 AM    11640 (0x2D78)
    Raising client SDK event for class CCM_Program, instance CCM_Program.PackageID="UCP00505",ProgramID="*", actionType 1l, value NULL, user NULL, session 4294967295l, level 0l, verbosity 30l    execmgr    12/10/2019 7:07:37 AM    11640 (0x2D78)
    Raising client SDK event for class CCM_Program, instance CCM_Program.PackageID="UCP00505",ProgramID="*", actionType 1l, value , user NULL, session 4294967295l, level 0l, verbosity 30l    execmgr    12/10/2019 7:07:37 AM    11640 (0x2D78)
    EvaluateRequestForExecution - Updated current running request    execmgr    12/10/2019 7:07:37 AM    11640 (0x2D78)
    MTC task with id {1C7CE3F9-E27C-41E5-9A50-0C7E5C7AFA58}, changed state from 4 to 5    execmgr    12/10/2019 7:07:37 AM    4916 (0x1334)
    CoImpersonateClient() returned RPC_E_CALL_COMPLETE. Since we are running in the same context of CCMEXEC, treat this as success.    execmgr    12/10/2019 7:07:41 AM    9964 (0x26EC)
    Looking for MIF file to get program status    execmgr    12/10/2019 7:07:42 AM    8516 (0x2144)
    Execution is complete for program *. The exit code is 0, the execution status is Success    execmgr    12/10/2019 7:07:42 AM    6440 (0x1928)
    The task sequence UCP00505 was successfully started. See TSAgent.log and SMSTS.LOG for more details.    execmgr    12/10/2019 7:07:42 AM    6440 (0x1928)
    CSoftwareDistPolicyMgr::GetPolicyFromWMIObject - Check if TS Policy    execmgr    12/10/2019 7:07:42 AM    6440 (0x1928)
    CSoftwareDistPolicyMgr::GetPolicyFromWMIObject - looking for AdditionalProperties flag    execmgr    12/10/2019 7:07:42 AM    6440 (0x1928)
    This machine is not a workstation, returning false for MDMIsExternallyManaged.    execmgr    12/10/2019 7:07:42 AM    6440 (0x1928)
    Execution Request for advert UCP2028E package UCP00505 program * state change from Running to Completed    execmgr    12/10/2019 7:07:42 AM    6440 (0x1928)
    Raising client SDK event for class CCM_Program, instance CCM_Program.PackageID="UCP00505",ProgramID="*", actionType 1l, value , user NULL, session 4294967295l, level 0l, verbosity 30l    execmgr    12/10/2019 7:07:42 AM    6440 (0x1928)
    Raising client SDK event for class CCM_Program, instance CCM_Program.PackageID="UCP00505",ProgramID="*", actionType 1l, value , user NULL, session 4294967295l, level 0l, verbosity 30l    execmgr    12/10/2019 7:07:42 AM    6440 (0x1928)
      Processing [{534768A5-778D-4C9D-A989-D5A1F2F1ED39}, 0]: OnContentAvailable     execmgr    12/10/2019 7:46:21 AM    9328 (0x2470)
    OnContentAvailable invalid request GUID handle    execmgr    12/10/2019 7:46:21 AM    9328 (0x2470)
      Processing [{534768A5-778D-4C9D-A989-D5A1F2F1ED39}, 0]: RemoveNotification    execmgr    12/10/2019 7:46:21 AM    9328 (0x2470)
      Processing [{534768A5-778D-4C9D-A989-D5A1F2F1ED39}, 0]: OnContentAvailable     execmgr    12/10/2019 8:46:21 AM    6440 (0x1928)
    OnContentAvailable invalid request GUID handle    execmgr    12/10/2019 8:46:21 AM    6440 (0x1928)
      Processing [{534768A5-778D-4C9D-A989-D5A1F2F1ED39}, 0]: RemoveNotification    execmgr    12/10/2019 8:46:21 AM    6440 (0x1928)

    in progress...

    CAS.log

    ===== CacheManager: Cache state initialization completed =====	ContentAccess	11/27/2019 8:32:22 AM	5732 (0x1664)
    **** Received request for content Content_a9abe093-17d0-4e82-a266-9a984c30cdf9.1, size(KB) 0, under context System with priority Low.	ContentAccess	12/10/2019 7:07:36 AM	8516 (0x2144)
    LS job {1A1574C2-6B12-4005-B070-B4DE5C6EA694} submitted to get DP locations for content Content_a9abe093-17d0-4e82-a266-9a984c30cdf9.1	ContentAccess	12/10/2019 7:07:36 AM	8516 (0x2144)
    Successfully created location request {534768A5-778D-4C9D-A989-D5A1F2F1ED39} for content Content_a9abe093-17d0-4e82-a266-9a984c30cdf9.1	ContentAccess	12/10/2019 7:07:36 AM	8516 (0x2144)
    Location update from LS for content Content_a9abe093-17d0-4e82-a266-9a984c30cdf9.1 and location request {534768A5-778D-4C9D-A989-D5A1F2F1ED39}	ContentAccess	12/10/2019 7:07:37 AM	8516 (0x2144)
       Matching DP location found 0 - https://chssccmdp01.ad.medctr.ucla.edu/sms_dp_smspkg$/content_a9abe093-17d0-4e82-a266-9a984c30cdf9.1 (Locality: LOCALHOST)	ContentAccess	12/10/2019 7:07:37 AM	8516 (0x2144)
       Matching DP location found 1 - https://chssccmdp01.ad.medctr.ucla.edu/nocert_sms_dp_smspkg$/content_a9abe093-17d0-4e82-a266-9a984c30cdf9.1 (Locality: LOCALHOST)	ContentAccess	12/10/2019 7:07:37 AM	8516 (0x2144)
       Matching DP location found 2 - https://chssccmdp01.ad.medctr.ucla.edu/ccmtokenauth_sms_dp_smspkg$/content_a9abe093-17d0-4e82-a266-9a984c30cdf9.1 (Locality: LOCALHOST)	ContentAccess	12/10/2019 7:07:37 AM	8516 (0x2144)
       Matching DP location found 3 - https://chssccmdp02.ad.medctr.ucla.edu/sms_dp_smspkg$/content_a9abe093-17d0-4e82-a266-9a984c30cdf9.1 (Locality: SUBNET)	ContentAccess	12/10/2019 7:07:37 AM	8516 (0x2144)
       Matching DP location found 4 - https://chssccmdp02.ad.medctr.ucla.edu/nocert_sms_dp_smspkg$/content_a9abe093-17d0-4e82-a266-9a984c30cdf9.1 (Locality: SUBNET)	ContentAccess	12/10/2019 7:07:37 AM	8516 (0x2144)
       Matching DP location found 5 - https://chssccmdp02.ad.medctr.ucla.edu/ccmtokenauth_sms_dp_smspkg$/content_a9abe093-17d0-4e82-a266-9a984c30cdf9.1 (Locality: SUBNET)	ContentAccess	12/10/2019 7:07:37 AM	8516 (0x2144)
    Location update from LS for content Content_a9abe093-17d0-4e82-a266-9a984c30cdf9.1 and location request {534768A5-778D-4C9D-A989-D5A1F2F1ED39}	ContentAccess	12/10/2019 7:46:21 AM	8516 (0x2144)
       Matching DP location found 0 - https://chssccmdp01.ad.medctr.ucla.edu/sms_dp_smspkg$/content_a9abe093-17d0-4e82-a266-9a984c30cdf9.1 (Locality: LOCALHOST)	ContentAccess	12/10/2019 7:46:21 AM	8516 (0x2144)
       Matching DP location found 1 - https://chssccmdp01.ad.medctr.ucla.edu/nocert_sms_dp_smspkg$/content_a9abe093-17d0-4e82-a266-9a984c30cdf9.1 (Locality: LOCALHOST)	ContentAccess	12/10/2019 7:46:21 AM	8516 (0x2144)
       Matching DP location found 2 - https://chssccmdp01.ad.medctr.ucla.edu/ccmtokenauth_sms_dp_smspkg$/content_a9abe093-17d0-4e82-a266-9a984c30cdf9.1 (Locality: LOCALHOST)	ContentAccess	12/10/2019 7:46:21 AM	8516 (0x2144)
       Matching DP location found 3 - https://chssccmdp02.ad.medctr.ucla.edu/sms_dp_smspkg$/content_a9abe093-17d0-4e82-a266-9a984c30cdf9.1 (Locality: SUBNET)	ContentAccess	12/10/2019 7:46:21 AM	8516 (0x2144)
       Matching DP location found 4 - https://chssccmdp02.ad.medctr.ucla.edu/nocert_sms_dp_smspkg$/content_a9abe093-17d0-4e82-a266-9a984c30cdf9.1 (Locality: SUBNET)	ContentAccess	12/10/2019 7:46:21 AM	8516 (0x2144)
       Matching DP location found 5 - https://chssccmdp02.ad.medctr.ucla.edu/ccmtokenauth_sms_dp_smspkg$/content_a9abe093-17d0-4e82-a266-9a984c30cdf9.1 (Locality: SUBNET)	ContentAccess	12/10/2019 7:46:21 AM	8516 (0x2144)
    Location update from LS for content Content_a9abe093-17d0-4e82-a266-9a984c30cdf9.1 and location request {534768A5-778D-4C9D-A989-D5A1F2F1ED39}	ContentAccess	12/10/2019 8:46:21 AM	9964 (0x26EC)
       Matching DP location found 0 - https://chssccmdp01.ad.medctr.ucla.edu/sms_dp_smspkg$/content_a9abe093-17d0-4e82-a266-9a984c30cdf9.1 (Locality: LOCALHOST)	ContentAccess	12/10/2019 8:46:21 AM	9964 (0x26EC)
       Matching DP location found 1 - https://chssccmdp01.ad.medctr.ucla.edu/nocert_sms_dp_smspkg$/content_a9abe093-17d0-4e82-a266-9a984c30cdf9.1 (Locality: LOCALHOST)	ContentAccess	12/10/2019 8:46:21 AM	9964 (0x26EC)
       Matching DP location found 2 - https://chssccmdp01.ad.medctr.ucla.edu/ccmtokenauth_sms_dp_smspkg$/content_a9abe093-17d0-4e82-a266-9a984c30cdf9.1 (Locality: LOCALHOST)	ContentAccess	12/10/2019 8:46:21 AM	9964 (0x26EC)
       Matching DP location found 3 - https://chssccmdp02.ad.medctr.ucla.edu/sms_dp_smspkg$/content_a9abe093-17d0-4e82-a266-9a984c30cdf9.1 (Locality: SUBNET)	ContentAccess	12/10/2019 8:46:21 AM	9964 (0x26EC)
       Matching DP location found 4 - https://chssccmdp02.ad.medctr.ucla.edu/nocert_sms_dp_smspkg$/content_a9abe093-17d0-4e82-a266-9a984c30cdf9.1 (Locality: SUBNET)	ContentAccess	12/10/2019 8:46:21 AM	9964 (0x26EC)
       Matching DP location found 5 - https://chssccmdp02.ad.medctr.ucla.edu/ccmtokenauth_sms_dp_smspkg$/content_a9abe093-17d0-4e82-a266-9a984c30cdf9.1 (Locality: SUBNET)	ContentAccess	12/10/2019 8:46:21 AM	9964 (0x26EC)

    Checking smsts.log now...

    ==========[ TsProgressUI started in process 8364 ]==========	TsProgressUI	12/10/2019 7:07:42 AM	3256 (0x0CB8)
    Registering COM classes					TsProgressUI	12/10/2019 7:07:42 AM	3256 (0x0CB8)
    sbModulePath = C:\Windows\CCM\TsProgressUI.exe		TsProgressUI	12/10/2019 7:07:42 AM	3256 (0x0CB8)
    Shutdown complete.						TsProgressUI	12/10/2019 7:07:42 AM	3256 (0x0CB8)
    Successfully initialized Logging for Task Sequence Manager.	TSManager	12/10/2019 7:07:42 AM	11648 (0x2D80)
    Commandline: C:\Windows\CCM\TSManager.exe /service	TSManager	12/10/2019 7:07:42 AM	11648 (0x2D80)
    Successfully registered Task Sequencing COM Interface.		TSManager	12/10/2019 7:07:42 AM	11648 (0x2D80)
    Running service module (tsmanager.exe) version 5.0.8853.1006 from location 'C:\Windows\CCM\TSManager.exe'									TSManager	12/10/2019 7:07:42 AM	11648 (0x2D80)
    Started ServiceMain						TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Task Sequence Manager executing as service main thread	TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    UEFI: true							TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Reading logging settings from Task Sequence environment to set Task Sequence logging.	
    TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Deleting volume ID file C:\_SMSTSVolumeID.7159644d-f741-45d5-ab29-0ad8aa4771ca ...
    								TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Deleting volume ID file E:\_SMSTSVolumeID.7159644d-f741-45d5-ab29-0ad8aa4771ca ...	
    TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Deleting volume ID file F:\_SMSTSVolumeID.7159644d-f741-45d5-ab29-0ad8aa4771ca ...	
    TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Parsing task sequence . . .					TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Task sequence schema version is 3.10				TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Current supported schema version is 3.10 and 3.00		TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Starting Task Sequence Engine . . . 				TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    *****************************************************TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Set a global environment variable _SMSTSNextInstructionPointer=0	
    TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Set a global environment variable _SMSTSInstructionTableSize=6
    								TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Set a global environment variable SMSTSRebootRequested=	TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Set a global environment variable SMSTSRebootMessage=	TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Set a global environment variable SMSTSRebootReason=	TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Set a global environment variable SMSTSRetryRequested=	TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    The task execution engine started execution			TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Begin searching client certificates based on Certificate Issuers	TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Certificate Issuer 1 [CN=ad-VRCA-CA]				TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Certificate Issuer 2 [CN=xxxx Root Certificate Authority]		TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Analyzing 1 Chain(s) found					TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Chain has Certificate [Thumbprint D5BBE1145D6CEE6B8353DB3D951944A483FE27A4] issued to [CN=WMSvc-SHA2-CHSSCCMDP01] issued by [CN=WMSvc-SHA2-CHSSCCMDP01]	TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Skipping Certificate [Thumbprint D5BBE1145D6CEE6B8353DB3D951944A483FE27A4] issued to 'WMSvc-SHA2-CHSSCCMDP01' as root is ''					TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Analyzing 1 Chain(s) found					TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Chain has Certificate [Thumbprint B363BB1DDAF0D5D6FC0668E8708EAD5747CCD24E] issued to [] issued by [CN=xxxx Health AD Certificate Authority-CA1]				TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Chain has Certificate [Thumbprint 3D4FDAC359EF8DA12CDE84FA6C31237A00021FF7] issued to [CN=xxxx Health AD Certificate Authority-CA1] issued by [CN=xxxx Root Certificate Authority]	
    TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Chain has Certificate [Thumbprint B60BA9406B1B7ADBF4848CE3DA0E977105C2ED92] issued to CN=xxxx Root Certificate Authority] issued by [CN=xxxx Root Certificate Authority]
    								TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Based on Certificate Issuer 'CN=xxxx Root Certificate Authority' found Certificate [Thumbprint B363BB1DDAF0D5D6FC0668E8708EAD5747CCD24E] issued to 'CHSSCCMDP01.ad'	
    TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Begin validation of Certificate [Thumbprint B363BB1DDAF0D5D6FC0668E8708EAD5747CCD24E] issued to 'CHSSCCMDP01.ad'						TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    CRL check enabled. 						TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Verification of Certificate chain returned 00000000		TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Completed validation of Certificate [Thumbprint B363BB1DDAF0D5D6FC0668E8708EAD5747CCD24E] issued to 'CHSSCCMDP01.ad'						TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Analyzing 1 Chain(s) found					TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Chain has Certificate [Thumbprint B089F615A9C8A626DE91857D23CFED912DB446C8] issued to [] issued by [CN=xxxx Health AD Certificate Authority-CA1]				TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Chain has Certificate [Thumbprint 3D4FDAC359EF8DA12CDE84FA6C31237A00021FF7] issued to [CN=xxxx AD Certificate Authority-CA1] issued by [CN=xxxx Root Certificate Authority]	TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Chain has Certificate [Thumbprint B60BA9406B1B7ADBF4848CE3DA0E977105C2ED92] issued to [CN=xxxx Root Certificate Authority] issued by [CN=xxxx Root Certificate Authority]	
    TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Based on Certificate Issuer 'CN=xxxx Certificate Authority' found Certificate [Thumbprint B089F615A9C8A626DE91857D23CFED912DB446C8] issued to 'CHSSCCMDP01.ad'	
    TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Begin validation of Certificate [Thumbprint B089F615A9C8A626DE91857D23CFED912DB446C8] issued to 'CHSSCCMDP01.ad'						TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    CRL check enabled. 						TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Verification of Certificate chain returned 00000000		TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Completed validation of Certificate [Thumbprint B089F615A9C8A626DE91857D23CFED912DB446C8] issued to 'CHSSCCMDP01.ad'						TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Analyzing 1 Chain(s) found					TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Chain has Certificate [Thumbprint 340B45D70838A54EDECBE13429E70204F5B53F99] issued to [CN=chssccmdp01.ad] issued by [CN=xxxx AD Certificate Authority-CA1]		TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Chain has Certificate [Thumbprint 3D4FDAC359EF8DA12CDE84FA6C31237A00021FF7] issued to [CN=Xxxx AD Certificate Authority-CA1] issued by [CN=xxxx Root Certificate Authority]	TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Chain has Certificate [Thumbprint B60BA9406B1B7ADBF4848CE3DA0E977105C2ED92] issued to [CN=Xxxx Root Certificate Authority] issued by [CN=Xxxx Root Certificate Authority]	
    TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Based on Certificate Issuer 'CN=Xxxx Root Certificate Authority' found Certificate [Thumbprint 340B45D70838A54EDECBE13429E70204F5B53F99] issued to 'chssccmdp01'	
    TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Begin validation of Certificate [Thumbprint 340B45D70838A54EDECBE13429E70204F5B53F99] issued to 'chssccmdp01'									TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    CRL check enabled. 						TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Verification of Certificate chain returned 00000000		TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Completed validation of Certificate [Thumbprint 340B45D70838A54EDECBE13429E70204F5B53F99] issued to 'chssccmdp01'							TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Completed searching client certificates based on Certificate Issuers	
    TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Begin to select client certificate					TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    The 'Certificate Selection Criteria' was not specified, counting number of certificates present in 'MY' store of 'Local Computer'.							TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    3 certificate(s) found in the 'MY' certificate store.		TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    The 'MY' of 'Local Computer' store has 3 certificate(s). Using custom selection criteria based on the machine name.									TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Machine name is 'CHSSCCMDP01.ad'.				TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    There are no certificate(s) that meet the criteria.		TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Performing search that includes SAN2 extensions...		TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Found a certificate with subject name as ‘chssccmdp01’, but will continue to look for the certificate with subject name as ‘CHSSCCMDP01.ad’.						TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Checking if certificate [Thumbprint 340B45D70838A54EDECBE13429E70204F5B53F99] issued to 'CHSSCCMDP01.ad' is valid for ConfigMgr usage.					TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Begin validation of Certificate [Thumbprint 340B45D70838A54EDECBE13429E70204F5B53F99] issued to 'chssccmdp01'									TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Allowing usage of CNG key storage.				TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    The Certificate [Thumbprint 340B45D70838A54EDECBE13429E70204F5B53F99] issued to 'chssccmdp01' doesn't have 'Client Authentication' capability.				TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Completed validation of Certificate [Thumbprint 340B45D70838A54EDECBE13429E70204F5B53F99] issued to 'chssccmdp01'							TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    The certificate [Thumbprint 340B45D70838A54EDECBE13429E70204F5B53F99] found using 'chssccmdp01.ad' as cert name is not valid for ConfigMgr usage.				TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Checking if certificate [Thumbprint B089F615A9C8A626DE91857D23CFED912DB446C8] issued to 'CHSSCCMDP01.ad' is valid for ConfigMgr usage.					TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Begin validation of Certificate [Thumbprint B089F615A9C8A626DE91857D23CFED912DB446C8] issued to 'CHSSCCMDP01.ad'						TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Allowing usage of CNG key storage.				TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    The Certificate [Thumbprint B089F615A9C8A626DE91857D23CFED912DB446C8] issued to 'CHSSCCMDP01.ad' has 'Client Authentication' capability.					TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Completed validation of Certificate [Thumbprint B089F615A9C8A626DE91857D23CFED912DB446C8] issued to 'CHSSCCMDP01.ad'						TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Checking if certificate [Thumbprint B363BB1DDAF0D5D6FC0668E8708EAD5747CCD24E] issued to 'CHSSCCMDP01.ad' is valid for ConfigMgr usage.					TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Begin validation of Certificate [Thumbprint B363BB1DDAF0D5D6FC0668E8708EAD5747CCD24E] issued to 'CHSSCCMDP01.ad'						TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Allowing usage of CNG key storage.				TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    The Certificate [Thumbprint B363BB1DDAF0D5D6FC0668E8708EAD5747CCD24E] issued to 'CHSSCCMDP01.ad' has 'Client Authentication' capability.				TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Completed validation of Certificate [Thumbprint B363BB1DDAF0D5D6FC0668E8708EAD5747CCD24E] issued to 'CHSSCCMDP01.ad'						TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    >>> Client selected the PKI Certificate [Thumbprint B363BB1DDAF0D5D6FC0668E8708EAD5747CCD24E] issued to 'CHSSCCMDP01.ad'						TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    SSL, using authenticator in request.				TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Has more instructions.						TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Start executing an instruction. Instruction name: Removal ECAT. Instruction pointer: 0	
    TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Set a global environment variable _SMSTSCurrentActionName=Removal ECAT	
    TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Set a global environment variable _SMSTSNextInstructionPointer=0	
    TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Unable to create an instance of the Progress UI COM Object. 0x8000401a.	T
    SManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    The group (Removal ECAT) has been successfully started		TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Begin searching client certificates based on Certificate Issuers	TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Certificate Issuer 1 [CN=ad-VRCA-CA]				TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Certificate Issuer 2 [CN=Xxxx Root Certificate Authority]		TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Analyzing 1 Chain(s) found					TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Chain has Certificate [Thumbprint D5BBE1145D6CEE6B8353DB3D951944A483FE27A4] issued to [CN=WMSvc-SHA2-CHSSCCMDP01] issued by [CN=WMSvc-SHA2-CHSSCCMDP01]	TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Skipping Certificate [Thumbprint D5BBE1145D6CEE6B8353DB3D951944A483FE27A4] issued to 'WMSvc-SHA2-CHSSCCMDP01' as root is ''					TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Analyzing 1 Chain(s) found					TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Chain has Certificate [Thumbprint B363BB1DDAF0D5D6FC0668E8708EAD5747CCD24E] issued to [] issued by [CN=Xxxx AD Certificate Authority-CA1]					TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Chain has Certificate [Thumbprint 3D4FDAC359EF8DA12CDE84FA6C31237A00021FF7] issued to [CN=Xxxx AD Certificate Authority-CA1] issued by [CN=Xxxx Root Certificate Authority]	TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Chain has Certificate [Thumbprint B60BA9406B1B7ADBF4848CE3DA0E977105C2ED92] issued to [CN=Xxxx Root Certificate Authority] issued by [CN=Xxxx Root Certificate Authority]
    								TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Based on Certificate Issuer 'CN=Xxxx Root Certificate Authority' found Certificate [Thumbprint B363BB1DDAF0D5D6FC0668E8708EAD5747CCD24E] issued to 'CHSSCCMDP01.ad'	
    TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Begin validation of Certificate [Thumbprint B363BB1DDAF0D5D6FC0668E8708EAD5747CCD24E] issued to 'CHSSCCMDP01.ad'						TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    CRL check enabled. 						TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Verification of Certificate chain returned 00000000		TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Completed validation of Certificate [Thumbprint B363BB1DDAF0D5D6FC0668E8708EAD5747CCD24E] issued to 'CHSSCCMDP01.ad'						TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Analyzing 1 Chain(s) found					TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Chain has Certificate [Thumbprint B089F615A9C8A626DE91857D23CFED912DB446C8] issued to [] issued by [CN=Xxxx AD Certificate Authority-CA1]					TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Chain has Certificate [Thumbprint 3D4FDAC359EF8DA12CDE84FA6C31237A00021FF7] issued to [CN=Xxxx AD Certificate Authority-CA1] issued by [CN=Xxxx Root Certificate Authority]	TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Chain has Certificate [Thumbprint B60BA9406B1B7ADBF4848CE3DA0E977105C2ED92] issued to [CN=Xxxx Root Certificate Authority] issued by [CN=Xxxx Root Certificate Authority]
    								TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Based on Certificate Issuer 'CN=Xxxx Root Certificate Authority' found Certificate [Thumbprint B089F615A9C8A626DE91857D23CFED912DB446C8] issued to 'CHSSCCMDP01.ad'	
    TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Begin validation of Certificate [Thumbprint B089F615A9C8A626DE91857D23CFED912DB446C8] issued to 'CHSSCCMDP01.ad'						TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    CRL check enabled. 						TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Verification of Certificate chain returned 00000000		TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Completed validation of Certificate [Thumbprint B089F615A9C8A626DE91857D23CFED912DB446C8] issued to 'CHSSCCMDP01.ad'						TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Analyzing 1 Chain(s) found					TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Chain has Certificate [Thumbprint 340B45D70838A54EDECBE13429E70204F5B53F99] issued to [CN=chssccmdp01.ad] issued by [CN=Xxxx AD Certificate Authority-CA1]		TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Chain has Certificate [Thumbprint 3D4FDAC359EF8DA12CDE84FA6C31237A00021FF7] issued to [CN=Xxxx AD Certificate Authority-CA1] issued by [CN=Xxxx Root Certificate Authority]	TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Chain has Certificate [Thumbprint B60BA9406B1B7ADBF4848CE3DA0E977105C2ED92] issued to [CN=Xxxx Root Certificate Authority] issued by [CN=Xxxx Root Certificate Authority]
    								TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Based on Certificate Issuer 'CN=Xxxx Root Certificate Authority' found Certificate [Thumbprint 340B45D70838A54EDECBE13429E70204F5B53F99] issued to 'chssccmdp01'	
    TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Begin validation of Certificate [Thumbprint 340B45D70838A54EDECBE13429E70204F5B53F99] issued to 'chssccmdp01'									TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    CRL check enabled. 						TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Verification of Certificate chain returned 00000000		TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Completed validation of Certificate [Thumbprint 340B45D70838A54EDECBE13429E70204F5B53F99] issued to 'chssccmdp01'							TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Completed searching client certificates based on Certificate Issuers	
    TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Begin to select client certificate					TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    The 'Certificate Selection Criteria' was not specified, counting number of certificates present in 'MY' store of 'Local Computer'.							TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    3 certificate(s) found in the 'MY' certificate store.		TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    The 'MY' of 'Local Computer' store has 3 certificate(s). Using custom selection criteria based on the machine name.									TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Machine name is 'CHSSCCMDP01.ad'.				TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    There are no certificate(s) that meet the criteria.		TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Performing search that includes SAN2 extensions...		TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Found a certificate with subject name as ‘chssccmdp01’, but will continue to look for the certificate with subject name as ‘CHSSCCMDP01.ad’.						TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Checking if certificate [Thumbprint 340B45D70838A54EDECBE13429E70204F5B53F99] issued to 'CHSSCCMDP01.ad' is valid for ConfigMgr usage.					TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Begin validation of Certificate [Thumbprint 340B45D70838A54EDECBE13429E70204F5B53F99] issued to 'chssccmdp01'									TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Allowing usage of CNG key storage.				TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    The Certificate [Thumbprint 340B45D70838A54EDECBE13429E70204F5B53F99] issued to 'chssccmdp01' doesn't have 'Client Authentication' capability.				TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Completed validation of Certificate [Thumbprint 340B45D70838A54EDECBE13429E70204F5B53F99] issued to 'chssccmdp01'							TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    The certificate [Thumbprint 340B45D70838A54EDECBE13429E70204F5B53F99] found using 'chssccmdp01.ad' as cert name is not valid for ConfigMgr usage.				TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Checking if certificate [Thumbprint B089F615A9C8A626DE91857D23CFED912DB446C8] issued to 'CHSSCCMDP01.ad' is valid for ConfigMgr usage.					TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Begin validation of Certificate [Thumbprint B089F615A9C8A626DE91857D23CFED912DB446C8] issued to 'CHSSCCMDP01.ad'						TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Allowing usage of CNG key storage.				TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    The Certificate [Thumbprint B089F615A9C8A626DE91857D23CFED912DB446C8] issued to 'CHSSCCMDP01.ad' has 'Client Authentication' capability.					TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Completed validation of Certificate [Thumbprint B089F615A9C8A626DE91857D23CFED912DB446C8] issued to 'CHSSCCMDP01.ad'						TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Checking if certificate [Thumbprint B363BB1DDAF0D5D6FC0668E8708EAD5747CCD24E] issued to 'CHSSCCMDP01.ad' is valid for ConfigMgr usage.					TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Begin validation of Certificate [Thumbprint B363BB1DDAF0D5D6FC0668E8708EAD5747CCD24E] issued to 'CHSSCCMDP01.ad'						TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Allowing usage of CNG key storage.				TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    The Certificate [Thumbprint B363BB1DDAF0D5D6FC0668E8708EAD5747CCD24E] issued to 'CHSSCCMDP01.ad' has 'Client Authentication' capability.				TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Completed validation of Certificate [Thumbprint B363BB1DDAF0D5D6FC0668E8708EAD5747CCD24E] issued to 'CHSSCCMDP01.ad'						TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    >>> Client selected the PKI Certificate [Thumbprint B363BB1DDAF0D5D6FC0668E8708EAD5747CCD24E] issued to 'CHSSCCMDP01.ad'						TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    SSL, using authenticator in request.				TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Has more instructions.						TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Start executing an instruction. Instruction name: Removal ECAT. Instruction pointer: 0	
    TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Set a global environment variable _SMSTSCurrentActionName=Removal ECAT	
    TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Set a global environment variable _SMSTSNextInstructionPointer=0	
    TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Unable to create an instance of the Progress UI COM Object. 0x8000401a.	
    TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    The group (Removal ECAT) has been successfully started		TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Begin searching client certificates based on Certificate Issuers	TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Certificate Issuer 1 [CN=ad-VRCA-CA]				TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Certificate Issuer 2 [CN=Xxxx Root Certificate Authority]		TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Analyzing 1 Chain(s) found					TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Chain has Certificate [Thumbprint D5BBE1145D6CEE6B8353DB3D951944A483FE27A4] issued to [CN=WMSvc-SHA2-CHSSCCMDP01] issued by [CN=WMSvc-SHA2-CHSSCCMDP01]	TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Skipping Certificate [Thumbprint D5BBE1145D6CEE6B8353DB3D951944A483FE27A4] issued to 'WMSvc-SHA2-CHSSCCMDP01' as root is ''					TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Analyzing 1 Chain(s) found					TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Chain has Certificate [Thumbprint B363BB1DDAF0D5D6FC0668E8708EAD5747CCD24E] issued to [] issued by [CN=Xxxx AD Certificate Authority-CA1]					TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Chain has Certificate [Thumbprint 3D4FDAC359EF8DA12CDE84FA6C31237A00021FF7] issued to [CN=Xxxx AD Certificate Authority-CA1] issued by [CN=Xxxx Root Certificate Authority]	TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Chain has Certificate [Thumbprint B60BA9406B1B7ADBF4848CE3DA0E977105C2ED92] issued to [CN=Xxxx Root Certificate Authority] issued by [CN=Xxxx Root Certificate Authority]	
    TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Based on Certificate Issuer 'CN=Xxxx Root Certificate Authority' found Certificate [Thumbprint B363BB1DDAF0D5D6FC0668E8708EAD5747CCD24E] issued to 'CHSSCCMDP01.ad'	
    TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Begin validation of Certificate [Thumbprint B363BB1DDAF0D5D6FC0668E8708EAD5747CCD24E] issued to 'CHSSCCMDP01.ad'						TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    CRL check enabled. 						TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Verification of Certificate chain returned 00000000		TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Completed validation of Certificate [Thumbprint B363BB1DDAF0D5D6FC0668E8708EAD5747CCD24E] issued to 'CHSSCCMDP01.ad'						TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Analyzing 1 Chain(s) found					TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Chain has Certificate [Thumbprint B089F615A9C8A626DE91857D23CFED912DB446C8] issued to [] issued by [CN=Xxxx AD Certificate Authority-CA1]					TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Chain has Certificate [Thumbprint 3D4FDAC359EF8DA12CDE84FA6C31237A00021FF7] issued to [CN=Xxxx AD Certificate Authority-CA1] issued by [CN=Xxxx Root Certificate Authority]	TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Chain has Certificate [Thumbprint B60BA9406B1B7ADBF4848CE3DA0E977105C2ED92] issued to [CN=Xxxx Root Certificate Authority] issued by [CN=Xxxx Root Certificate Authority]	
    TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Based on Certificate Issuer 'CN=Xxxx Root Certificate Authority' found Certificate [Thumbprint B089F615A9C8A626DE91857D23CFED912DB446C8] issued to 'CHSSCCMDP01.ad'	
    TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Begin validation of Certificate [Thumbprint B089F615A9C8A626DE91857D23CFED912DB446C8] issued to 'CHSSCCMDP01.ad'						TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    CRL check enabled. 						TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Verification of Certificate chain returned 00000000		TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Completed validation of Certificate [Thumbprint B089F615A9C8A626DE91857D23CFED912DB446C8] issued to 'CHSSCCMDP01.ad'						TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Analyzing 1 Chain(s) found					TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Chain has Certificate [Thumbprint 340B45D70838A54EDECBE13429E70204F5B53F99] issued to [CN=chssccmdp01.ad] issued by [CN=Xxxx AD Certificate Authority-CA1]		TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Chain has Certificate [Thumbprint 3D4FDAC359EF8DA12CDE84FA6C31237A00021FF7] issued to [CN=Xxxx AD Certificate Authority-CA1] issued by [CN=Xxxx Root Certificate Authority]	TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Chain has Certificate [Thumbprint B60BA9406B1B7ADBF4848CE3DA0E977105C2ED92] issued to [CN=Xxxx Root Certificate Authority] issued by [CN=Xxxx Root Certificate Authority]	
    TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Based on Certificate Issuer 'CN=Xxxx Root Certificate Authority' found Certificate [Thumbprint 340B45D70838A54EDECBE13429E70204F5B53F99] issued to 'chssccmdp01'	
    TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Begin validation of Certificate [Thumbprint 340B45D70838A54EDECBE13429E70204F5B53F99] issued to 'chssccmdp01'									TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    CRL check enabled.					 	TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Verification of Certificate chain returned 00000000		TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Completed validation of Certificate [Thumbprint 340B45D70838A54EDECBE13429E70204F5B53F99] issued to 'chssccmdp01'							TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Completed searching client certificates based on Certificate Issuers	
    TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Begin to select client certificate					TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    The 'Certificate Selection Criteria' was not specified, counting number of certificates present in 'MY' store of 'Local Computer'.							TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    3 certificate(s) found in the 'MY' certificate store.		TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    The 'MY' of 'Local Computer' store has 3 certificate(s). Using custom selection criteria based on the machine name.									TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Machine name is 'CHSSCCMDP01.ad'.				TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    There are no certificate(s) that meet the criteria.		TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Performing search that includes SAN2 extensions...		TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Found a certificate with subject name as ‘chssccmdp01’, but will continue to look for the certificate with subject name as ‘CHSSCCMDP01.ad’.						TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Checking if certificate [Thumbprint 340B45D70838A54EDECBE13429E70204F5B53F99] issued to 'CHSSCCMDP01.ad' is valid for ConfigMgr usage.					TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Begin validation of Certificate [Thumbprint 340B45D70838A54EDECBE13429E70204F5B53F99] issued to 'chssccmdp01'									TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Allowing usage of CNG key storage.				TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    The Certificate [Thumbprint 340B45D70838A54EDECBE13429E70204F5B53F99] issued to 'chssccmdp01' doesn't have 'Client Authentication' capability.				TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Completed validation of Certificate [Thumbprint 340B45D70838A54EDECBE13429E70204F5B53F99] issued to 'chssccmdp01'							TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    The certificate [Thumbprint 340B45D70838A54EDECBE13429E70204F5B53F99] found using 'chssccmdp01.ad' as cert name is not valid for ConfigMgr usage.				TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Checking if certificate [Thumbprint B089F615A9C8A626DE91857D23CFED912DB446C8] issued to 'CHSSCCMDP01.ad' is valid for ConfigMgr usage.					TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Begin validation of Certificate [Thumbprint B089F615A9C8A626DE91857D23CFED912DB446C8] issued to 'CHSSCCMDP01.ad'						TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Allowing usage of CNG key storage.				TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    The Certificate [Thumbprint B089F615A9C8A626DE91857D23CFED912DB446C8] issued to 'CHSSCCMDP01.ad' has 'Client Authentication' capability.					TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Completed validation of Certificate [Thumbprint B089F615A9C8A626DE91857D23CFED912DB446C8] issued to 'CHSSCCMDP01.ad'						TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Checking if certificate [Thumbprint B363BB1DDAF0D5D6FC0668E8708EAD5747CCD24E] issued to 'CHSSCCMDP01.ad' is valid for ConfigMgr usage.					TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Begin validation of Certificate [Thumbprint B363BB1DDAF0D5D6FC0668E8708EAD5747CCD24E] issued to 'CHSSCCMDP01.ad'						TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Allowing usage of CNG key storage.				TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    The Certificate [Thumbprint B363BB1DDAF0D5D6FC0668E8708EAD5747CCD24E] issued to 'CHSSCCMDP01.ad' has 'Client Authentication' capability.				TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Completed validation of Certificate [Thumbprint B363BB1DDAF0D5D6FC0668E8708EAD5747CCD24E] issued to 'CHSSCCMDP01.ad'						TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    >>> Client selected the PKI Certificate [Thumbprint B363BB1DDAF0D5D6FC0668E8708EAD5747CCD24E] issued to 'CHSSCCMDP01.ad'						TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    SSL, using authenticator in request.				TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Updated security on object F:\_SMSTaskSequence.		TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Set a global environment variable _SMSTSNextInstructionPointer=1	
    TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Set a Task Sequence execution environment variable _SMSTSNextInstructionPointer=1	
    TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Set a global environment variable _SMSTSInstructionStackString=0	
    TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Set a Task Sequence execution environment variable _SMSTSInstructionStackString=0	
    TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Save the current environment block				TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Save the current environment block				TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Set a global environment variable _SMSTSLastActionRetryCount=0	
    TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Has more instructions.						TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Start executing an instruction. Instruction name: Uninstallation RSA ECAT. Instruction pointer: 1	
    TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Set a global environment variable _SMSTSCurrentActionName=Uninstallation RSA ECAT	
    TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Set a global environment variable _SMSTSNextInstructionPointer=1	
    TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Unable to create an instance of the Progress UI COM Object. 0x8000401a.	
    TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Set a local default variable SMSTSDisableWow64Redirection	TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Set a local default variable _SMSTSRunCommandLineAsUser	TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Set a global environment variable _SMSTSLogPath=C:\Windows\CCM\Logs\SMSTSLog	
    TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Expand a string: smsswd.exe /run: MsiExec.exe /x {63AC4523-5F19-42F0-BC43-97C8B5373589} /l*v C:\Temp\Uninstall.log						TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Expand a string:						 	TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Start executing the command line: smsswd.exe /run: MsiExec.exe /x {63AC4523-5F19-42F0-BC43-97C8B5373589} /l*v C:\Temp\Uninstall.log						TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    !--------------------------------------------------------------------------------------------!	
    TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Expand a string: WinPEandFullOS				TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
    Executing command line: smsswd.exe /run: MsiExec.exe /x {63AC4523-5F19-42F0-BC43-97C8B5373589} /l*v C:\Temp\Uninstall.log with options (0, 4)			TSManager	12/10/2019 7:07:42 AM	3192 (0x0C78)
     ================================ [ smsswd.exe ] =======InstallSoftware	12/10/2019 7:07:42 AM	1168 (0x0490)
    Running module version 5.0.8853.1000 from location 'C:\Windows\CCM\smsswd.exe'	
    InstallSoftware	12/10/2019 7:07:42 AM	1168 (0x0490)
    PackageID = ''							InstallSoftware	12/10/2019 7:07:42 AM	1168 (0x0490)
    BaseVar = '', ContinueOnError=''					InstallSoftware	12/10/2019 7:07:42 AM	1168 (0x0490)
    ProgramName is being logged ('OSDDoNotLogCommand' is not set to 'True')	
    InstallSoftware	12/10/2019 7:07:42 AM	1168 (0x0490)
    ProgramName = 'MsiExec.exe /x {63AC4523-5F19-42F0-BC43-97C8B5373589} /l*v C:\Temp\Uninstall.log'										InstallSoftware	12/10/2019 7:07:42 AM	1168 (0x0490)
    SwdAction = '0001'						InstallSoftware	12/10/2019 7:07:42 AM	1168 (0x0490)
    Command line for extension .exe is "%1" %*			InstallSoftware	12/10/2019 7:07:42 AM	1168 (0x0490)
    Set command line: Run command line				InstallSoftware	12/10/2019 7:07:42 AM	1168 (0x0490)
    Working dir 'not set'						InstallSoftware	12/10/2019 7:07:42 AM	1168 (0x0490)
    Executing command line: Run command line with options (0, 4)	InstallSoftware	12/10/2019 7:07:42 AM	1168 (0x0490)

    Uninstall.log

    === Verbose logging started: 12/10/2019  10:47:16  Build type: SHIP UNICODE 5.00.10011.00  Calling process: C:\Windows\system32\msiexec.exe ===
    MSI (c) (B8:BC) [10:47:16:707]: Resetting cached policy values
    MSI (c) (B8:BC) [10:47:16:707]: Machine policy value 'Debug' is 0
    MSI (c) (B8:BC) [10:47:16:707]: ******* RunEngine:
               ******* Product: {63AC4523-5F19-42F0-BC43-97C8B5373589}
               ******* Action: 
               ******* CommandLine: **********
    MSI (c) (B8:BC) [10:47:16:707]: Client-side and UI is none or basic: Running entire install on the server.
    MSI (c) (B8:BC) [10:47:16:707]: Grabbed execution mutex.
    MSI (c) (B8:BC) [10:47:16:722]: Cloaking enabled.
    MSI (c) (B8:BC) [10:47:16:722]: Attempting to enable all disabled privileges before calling Install on Server
    MSI (c) (B8:BC) [10:47:16:722]: Incrementing counter to disable shutdown. Counter after increment: 0
    MSI (s) (6C:C8) [10:47:16:738]: Running installation inside multi-package transaction {63AC4523-5F19-42F0-BC43-97C8B5373589}
    MSI (s) (6C:C8) [10:47:16:738]: Grabbed execution mutex.
    MSI (s) (6C:D0) [10:47:16:738]: Resetting cached policy values
    MSI (s) (6C:D0) [10:47:16:738]: Machine policy value 'Debug' is 0
    MSI (s) (6C:D0) [10:47:16:738]: ******* RunEngine:
               ******* Product: {63AC4523-5F19-42F0-BC43-97C8B5373589}
               ******* Action: 
               ******* CommandLine: **********
    MSI (s) (6C:D0) [10:47:16:738]: Machine policy value 'DisableUserInstalls' is 0
    MSI (s) (6C:D0) [10:47:16:738]: MainEngineThread is returning 1605
    MSI (s) (6C:C8) [10:47:16:738]: User policy value 'DisableRollback' is 0
    MSI (s) (6C:C8) [10:47:16:738]: Machine policy value 'DisableRollback' is 0
    MSI (s) (6C:C8) [10:47:16:738]: Incrementing counter to disable shutdown. Counter after increment: 0
    MSI (s) (6C:C8) [10:47:16:738]: Note: 1: 1402 2: HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts 3: 2 
    MSI (s) (6C:C8) [10:47:16:738]: Note: 1: 1402 2: HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts 3: 2 
    MSI (s) (6C:C8) [10:47:16:738]: Decrementing counter to disable shutdown. If counter >= 0, shutdown will be denied.  Counter after decrement: -1
    MSI (c) (B8:BC) [10:47:16:738]: Decrementing counter to disable shutdown. If counter >= 0, shutdown will be denied.  Counter after decrement: -1
    MSI (c) (B8:BC) [10:47:16:738]: MainEngineThread is returning 1605
    === Verbose logging stopped: 12/10/2019  10:47:16 ===

    Thanks,
    Dom


    Security / System Center Configuration Manager Current Branch / SQL



    • Edited by Felyjos Tuesday, December 10, 2019 7:47 PM
    Tuesday, December 10, 2019 4:58 PM
  • Hello,

    Now the message ID is 10005 for the task sequence...

    the smsts.log does not seem to have changed for the last 8 hours...

    Execmgr.log

    Policy deleted for advertisement UCP2028D package UCP00505 program *
    								execmgr	12/10/2019 7:09:19 AM	10264 (0x2818)
    Raising client SDK event for class CCM_Program, instance CCM_Program.PackageID="UCP00505",ProgramID="*", actionType 45l, value NULL, user NULL, session 4294967295l, level 0l, verbosity 30l	
    execmgr	12/10/2019 7:09:20 AM	10264 (0x2818)
    This machine is not a workstation, returning false for MDMIsExternallyManaged.
    								execmgr	12/10/2019 7:09:25 AM	10264 (0x2818)
    This machine is not a workstation, returning false for MDMIsExternallyManaged.	
    execmgr	12/10/2019 7:09:25 AM	12752 (0x31D0)
    Policy arrived for parent package UCP00505 program *		execmgr	12/10/2019 7:09:25 AM	10264 (0x2818)
    Mandatory execution requested for program * and advertisement UCP2028E	
    execmgr	12/10/2019 7:09:25 AM	12440 (0x3098)
    Creating mandatory request for advert UCP2028E, program *, package UCP00505	
    execmgr	12/10/2019 7:09:25 AM	12440 (0x3098)
    Raising client SDK event for class CCM_Program, instance CCM_Program.PackageID="UCP00505",ProgramID="*", actionType 6l, value NULL, user NULL, session 4294967295l, level 0l, verbosity 30l	
    execmgr	12/10/2019 7:09:25 AM	10264 (0x2818)
    This machine is not a workstation, returning false for MDMIsExternallyManaged.
    								execmgr	12/10/2019 7:09:25 AM	12440 (0x3098)
    Raising event:
    [SMS_CodePage(437), SMS_LocaleID(1033)]
    instance of SoftDistProgramOfferReceivedEvent
    {
    	AdvertisementId = "UCP2028E";
    	ClientID = "GUID:1782EE31-2A0D-47D5-9570-AD24397171F7";
    	DateTime = "20191210150925.356000+000";
    	MachineName = "SMHSCCMDP01";
    	ProcessID = 4648;
    	SiteCode = "UCP";
    	ThreadID = 10264;
    };
    								execmgr	12/10/2019 7:09:25 AM	10264 (0x2818)
    Execution Request for advert UCP2028E package UCP00505 program * state change from NotExist to WaitingDependency						execmgr	12/10/2019 7:09:25 AM	12440 (0x3098)
    Raising client SDK event for class CCM_Program, instance CCM_Program.PackageID="UCP00505",ProgramID="*", actionType 1l, value , user NULL, session 4294967295l, level 0l, verbosity 30l	
    execmgr	12/10/2019 7:09:25 AM	12440 (0x3098)
    Requesting content from CAS for package Content_a9abe093-17d0-4e82-a266-9a984c30cdf9 version 1	
    execmgr	12/10/2019 7:09:25 AM	12440 (0x3098)
    Successfully created a content request handle {3A05913D-4053-4DEA-8EEE-DFD972BE874B} for the package Content_a9abe093-17d0-4e82-a266-9a984c30cdf9 version 1	execmgr	12/10/2019 7:09:25 AM	12440 (0x3098)
    Raising event:
    [SMS_CodePage(437), SMS_LocaleID(1033)]
    instance of SoftDistWaitingContentEvent
    {
    	AdvertisementId = "";
    	ClientID = "GUID:1782EE31-2A0D-47D5-9570-AD24397171F7";
    	DateTime = "20191210150925.715000+000";
    	MachineName = "SMHSCCMDP01";
    	PackageName = "";
    	PackageVersion = "";
    	ProcessID = 4648;
    	ProgramName = "";
    	SiteCode = "UCP";
    	ThreadID = 12440;
    };
    								execmgr	12/10/2019 7:09:25 AM	12440 (0x3098)
    Successfully raised SoftDistWaitingContentEvent event for member program 	
    execmgr	12/10/2019 7:09:25 AM	12440 (0x3098)
    Execution Request for advert UCP2028E package UCP00505 program * state change from WaitingDependency to WaitingContent							execmgr	12/10/2019 7:09:25 AM	12440 (0x3098)
    Raising client SDK event for class CCM_Program, instance CCM_Program.PackageID="UCP00505",ProgramID="*", actionType 1l, value , user NULL, session 4294967295l, level 0l, verbosity 30l	
    execmgr	12/10/2019 7:09:25 AM	12440 (0x3098)
      Processing [{3A05913D-4053-4DEA-8EEE-DFD972BE874B}, 0]: OnContentAvailable 	
    execmgr	12/10/2019 7:09:25 AM	10520 (0x2918)
    This machine is not a workstation, returning false for MDMIsExternallyManaged.
    								execmgr	12/10/2019 7:09:25 AM	10520 (0x2918)
    [{00000000-0000-0000-0000-000000000000}]: Content Version  is available for advert UCP2028E, pkg: UCP00505, program *.							execmgr	12/10/2019 7:09:25 AM	10520 (0x2918)
    Execution Request for advert UCP2028E package UCP00505 program * state change from WaitingContent to WaitingDependency						execmgr	12/10/2019 7:09:25 AM	10520 (0x2918)
    Raising client SDK event for class CCM_Program, instance CCM_Program.PackageID="UCP00505",ProgramID="*", actionType 1l, value , user NULL, session 4294967295l, level 0l, verbosity 30l	
    execmgr	12/10/2019 7:09:26 AM	10520 (0x2918)
    An existing MTC token was not supplied, using ExecutionRequest's Id as MTC token and this execution request is the owner of resultant MTC task.					execmgr	12/10/2019 7:09:26 AM	10520 (0x2918)
    Request a MTC task for execution request of package UCP00505, program * with request id: {D9B0C521-AC9F-44AA-8AD5-FB40300D3D7F}						execmgr	12/10/2019 7:09:26 AM	10520 (0x2918)
    Execution Request for advert UCP2028E package UCP00505 program * state change from WaitingDependency to Ready									execmgr	12/10/2019 7:09:26 AM	10520 (0x2918)
    MTC task with id {D9B0C521-AC9F-44AA-8AD5-FB40300D3D7F}, changed state from 0 to 4	
    execmgr	12/10/2019 7:09:26 AM	580 (0x0244)
    Raising client SDK event for class CCM_Program, instance CCM_Program.PackageID="UCP00505",ProgramID="*", actionType 1l, value , user NULL, session 4294967295l, level 0l, verbosity 30l	
    execmgr	12/10/2019 7:09:26 AM	10520 (0x2918)
      Processing [{3A05913D-4053-4DEA-8EEE-DFD972BE874B}, 0]: RemoveNotification	
    execmgr	12/10/2019 7:09:26 AM	10520 (0x2918)
    This machine is not a workstation, returning false for MDMIsExternallyManaged.	
    execmgr	12/10/2019 7:09:26 AM	580 (0x0244)
    MTC signaled SWD execution request with program id: *, package id: UCP00505 for execution.	
    execmgr	12/10/2019 7:09:26 AM	580 (0x0244)
    Sending ack to MTC for task with id: {D9B0C521-AC9F-44AA-8AD5-FB40300D3D7F}	
    execmgr	12/10/2019 7:09:26 AM	580 (0x0244)
    Executing program  in Admin context				execmgr	12/10/2019 7:09:26 AM	580 (0x0244)
    Execution Request for advert UCP2028E package UCP00505 program * state change from Ready to NotifyExecution									execmgr	12/10/2019 7:09:26 AM	580 (0x0244)
    Raising client SDK event for class CCM_Program, instance CCM_Program.PackageID="UCP00505",ProgramID="*", actionType 1l, value , user NULL, session 4294967295l, level 0l, verbosity 30l	
    execmgr	12/10/2019 7:09:26 AM	580 (0x0244)
    Executing program as a task sequence.				execmgr	12/10/2019 7:09:26 AM	580 (0x0244)
    Executing TS Program						execmgr	12/10/2019 7:09:26 AM	580 (0x0244)
    Task Sequence started						execmgr	12/10/2019 7:09:26 AM	580 (0x0244)
    Raising event:
    [SMS_CodePage(437), SMS_LocaleID(1033)]
    instance of SoftDistProgramStartedEvent
    {
    	AdvertisementId = "UCP2028E";
    	ClientID = "GUID:1782EE31-2A0D-47D5-9570-AD24397171F7";
    	CommandLine = "";
    	DateTime = "20191210150926.747000+000";
    	MachineName = "SMHSCCMDP01";
    	PackageName = "UCP00505";
    	ProcessID = 4648;
    	ProgramName = "*";
    	SiteCode = "UCP";
    	ThreadID = 580;
    	UserContext = "NT AUTHORITY\\SYSTEM";
    	WorkingDirectory = "C:\\windows\\system32\\";
    };
    								execmgr	12/10/2019 7:09:26 AM	580 (0x0244)
    Raised Program Started Event for Ad:UCP2028E, Package:UCP00505, Program: *	
    execmgr	12/10/2019 7:09:26 AM	580 (0x0244)
    Raising client SDK event for class CCM_Program, instance CCM_Program.PackageID="UCP00505",ProgramID="*", actionType 1l, value NULL, user NULL, session 4294967295l, level 0l, verbosity 30l	
    execmgr	12/10/2019 7:09:26 AM	580 (0x0244)
    Raising client SDK event for class CCM_Program, instance CCM_Program.PackageID="UCP00505",ProgramID="*", actionType 1l, value , user NULL, session 4294967295l, level 0l, verbosity 30l	
    execmgr	12/10/2019 7:09:26 AM	580 (0x0244)
    EvaluateRequestForExecution - Updated current running request	
    execmgr	12/10/2019 7:09:26 AM	580 (0x0244)
    MTC task with id {D9B0C521-AC9F-44AA-8AD5-FB40300D3D7F}, changed state from 4 to 5	
    execmgr	12/10/2019 7:09:26 AM	580 (0x0244)
    CoImpersonateClient() returned RPC_E_CALL_COMPLETE. Since we are running in the same context of CCMEXEC, treat this as success.							execmgr	12/10/2019 7:09:31 AM	10520 (0x2918)
    Looking for MIF file to get program status			execmgr	12/10/2019 7:09:31 AM	12440 (0x3098)
    Execution is complete for program *. The exit code is 0, the execution status is Success	
    execmgr	12/10/2019 7:09:31 AM	9984 (0x2700)
    The task sequence UCP00505 was successfully started. See TSAgent.log and SMSTS.LOG for more details.										execmgr	12/10/2019 7:09:31 AM	9984 (0x2700)
    CSoftwareDistPolicyMgr::GetPolicyFromWMIObject - Check if TS Policy	
    execmgr	12/10/2019 7:09:31 AM	9984 (0x2700)
    CSoftwareDistPolicyMgr::GetPolicyFromWMIObject - looking for AdditionalProperties flag	
    execmgr	12/10/2019 7:09:31 AM	9984 (0x2700)
    This machine is not a workstation, returning false for MDMIsExternallyManaged.	
    execmgr	12/10/2019 7:09:31 AM	9984 (0x2700)
    Execution Request for advert UCP2028E package UCP00505 program * state change from Running to Completed										execmgr	12/10/2019 7:09:31 AM	9984 (0x2700)
    Raising client SDK event for class CCM_Program, instance CCM_Program.PackageID="UCP00505",ProgramID="*", actionType 1l, value , user NULL, session 4294967295l, level 0l, verbosity 30l	
    execmgr	12/10/2019 7:09:31 AM	9984 (0x2700)
    Raising client SDK event for class CCM_Program, instance CCM_Program.PackageID="UCP00505",ProgramID="*", actionType 1l, value , user NULL, session 4294967295l, level 0l, verbosity 30l	
    execmgr	12/10/2019 7:09:31 AM	9984 (0x2700)
      Processing [{3A05913D-4053-4DEA-8EEE-DFD972BE874B}, 0]: OnContentAvailable 	
    execmgr	12/10/2019 7:20:12 AM	10520 (0x2918)
    OnContentAvailable invalid request GUID handle		execmgr	12/10/2019 7:20:12 AM	10520 (0x2918)
      Processing [{3A05913D-4053-4DEA-8EEE-DFD972BE874B}, 0]: RemoveNotification	
    execmgr	12/10/2019 7:20:12 AM	10520 (0x2918)
      Processing [{3A05913D-4053-4DEA-8EEE-DFD972BE874B}, 0]: OnContentAvailable 	
    execmgr	12/10/2019 8:20:12 AM	12752 (0x31D0)
    OnContentAvailable invalid request GUID handle		execmgr	12/10/2019 8:20:12 AM	12752 (0x31D0)
      Processing [{3A05913D-4053-4DEA-8EEE-DFD972BE874B}, 0]: RemoveNotification	
    execmgr	12/10/2019 8:20:12 AM	12752 (0x31D0)
      Processing [{3A05913D-4053-4DEA-8EEE-DFD972BE874B}, 0]: OnContentAvailable 	
    execmgr	12/10/2019 9:20:12 AM	12440 (0x3098)
    OnContentAvailable invalid request GUID handle		execmgr	12/10/2019 9:20:12 AM	12440 (0x3098)
      Processing [{3A05913D-4053-4DEA-8EEE-DFD972BE874B}, 0]: RemoveNotification	
    execmgr	12/10/2019 9:20:12 AM	12440 (0x3098)
      Processing [{3A05913D-4053-4DEA-8EEE-DFD972BE874B}, 0]: OnContentAvailable 	
    execmgr	12/10/2019 10:20:12 AM    	14108 (0x371C)
    OnContentAvailable invalid request GUID handle	execmgr	12/10/2019 10:20:12 AM	14108 (0x371C)
      Processing [{3A05913D-4053-4DEA-8EEE-DFD972BE874B}, 0]: RemoveNotification	
    execmgr	12/10/2019 10:20:12 AM	14108 (0x371C)
      Processing [{3A05913D-4053-4DEA-8EEE-DFD972BE874B}, 0]: OnContentAvailable 	
    execmgr	12/10/2019 11:20:12 AM	14404 (0x3844)
    OnContentAvailable invalid request GUID handle	execmgr	12/10/2019 11:20:12 AM	14404 (0x3844)
      Processing [{3A05913D-4053-4DEA-8EEE-DFD972BE874B}, 0]: RemoveNotification	
    execmgr	

    TSAgent.log

    Initializing the Task Sequence...    TSAgent 12/10/2019 7:07:37 AM 11640 (0x2D78)

    User: SYSTEM                         TSAgent 12/10/2019 7:07:37 AM 9964 (0x26EC)

    Environment scope successfully created: Global\{51A016B6-F0DE-4752-B97C-54E6F386A912} TSAgent              12/10/2019 7:07:37 AM        9964 (0x26EC) Environment scope successfully created: Global\{BA3A3900-CA6D-4ac1-8C28-5073AFC22B03} TSAgent              12/10/2019 7:07:37 AM        9964 (0x26EC)

    If current logging settings specify more logging details to be preserved, update these settings in Task Sequence environment. TSAgent              12/10/2019 7:07:37 AM 9964 (0x26EC) Current LogMaxSize is saved to Task Sequence environment since it has not been saved before.        TSAgent              12/10/2019 7:07:37 AM 9964 (0x26EC) Current LogMaxHistory is saved to Task Sequence environment since it has not been saved before.     TSAgent              12/10/2019 7:07:37 AM 9964 (0x26EC) Current LogLevel is saved to Task Sequence environment since it has not been saved before.    TSAgent              12/10/2019 7:07:37 AM 9964 (0x26EC) Current LogEnabled is saved to Task Sequence environment since it has not been saved before.        TSAgent              12/10/2019 7:07:37 AM 9964 (0x26EC) Current LogDebug is saved to Task Sequence environment since it has not been saved before.        TSAgent              12/10/2019 7:07:37 AM 9964 (0x26EC) UEFI: true                                                                                                TSAgent              12/10/2019 7:07:37 AM 9964 (0x26EC) SMS Client GUIDGUID:4FA25F8D-BC8F-4FB1-B356-208711D5EAB6          TSAgent              12/10/2019 7:07:37 AM 9964 (0x26EC) The current advertisement ID is UCP2028E                                       TSAgent              12/10/2019 7:07:37 AM 9964 (0x26EC) The package ID of current deployment is UCP00505                        TSAgent              12/10/2019 7:07:37 AM 9964 (0x26EC) The package name of current deployment is ISS - Server - Remove ECAT - Install AMP        TSAgent            12/10/2019 7:07:37 AM 9964 (0x26EC) The program ID of current deployment is *                                        TSAgent              12/10/2019 7:07:37 AM 9964 (0x26EC) The PolicyID of current advertisement is UCP2028E-UCP00505-6F6BCC28               TSAgent              12/10/2019 7:07:37 AM 9964 (0x26EC) The Current Site Code is UCP                                                                TSAgent              12/10/2019 7:07:37 AM 9964 (0x26EC) The Current Management Point is https://VRPSCCMMS03.ad      TSAgent              12/10/2019 7:07:37 AM 9964 (0x26EC) getting the MP public signing certificates                                          TSAgent              12/10/2019 7:07:37 AM 9964 (0x26EC) Management Point public signing cert:

    308206233082040BA00302010202137D00005A70440D53853BFE973B000000005A7030.......

    ...Management

    Point public signing cert: 308205F6308203DEA00302010202137D0000576549331.....

    Management Point public signing cert: 308205F6308203DEA00302010202137.....................

    ....

    CRL Checking is Enabled.                                                                       TSAgent              12/10/2019 7:07:37 AM 9964 (0x26EC)

    Enumerating user affinity                                                                      TSAgent              12/10/2019 7:07:38 AM 9964 (0x26EC) User affinity:                                                                                            TSAgent              12/10/2019 7:07:38 AM 9964 (0x26EC)

    Successfully retrieved TS launch information.                                  TSAgent              12/10/2019 7:07:38 AM 9964 (0x26EC)

    Time zone: 480,0,-60,0,11,0,1,2,0,0,0,0,3,0,2,2,0,0,0,Pacific Standard

    Time,Pacific Daylight Time          TSAgent     12/10/2019 7:07:38 AM              9964 (0x26EC)

    Successfully retrieved Current TimeZone information.                  TSAgent              12/10/2019 7:07:38 AM 9964 (0x26EC)

    Initializing policy environment variables                                            TSAgent              12/10/2019 7:07:38 AM 9964 (0x26EC) Found Task Sequence policy in local WMI                                           TSAgent              12/10/2019 7:07:38 AM 9964 (0x26EC) Client Identity is not yet defined.                                                        TSAgent              12/10/2019 7:07:38 AM 9964 (0x26EC)

    _SMSTSClientIdentity=GUID:4FA25F8D-BC8F-4FB1-B356-208711D5EAB6 TSAgent              12/10/2019 7:07:38 AM 9964(0x26EC)

    found non-active policy: DEP-UCP2026D-ScopeId_67BB9074-421B-4166-A053-A8090F9523EF/Application_f37fa6ea-c1bc-4127-866c-57b37c9c2994                                                                TSAgent              12/10/2019 7:07:38 AM 9964 (0x26EC)

    .....

    Downloading policy body {fa01b39b-a58b-46d9-b3f1-3b8968f0c3b5}. TSAgent 12/10/2019 7:07:41 AM 9964 (0x26EC) Retrieving collection variable policy. TSAgent 12/10/2019 7:07:41 AM 9964 (0x26EC) Retrieving machine variable policy. TSAgent 12/10/2019 7:07:41 AM 9964 (0x26EC) Downloading policy body {010037EC}-{UCP}. TSAgent 12/10/2019 7:07:41 AM 9964 (0x26EC) Setting collection variables in the task sequencing environment.TSAgent 12/10/2019 7:07:41 AM 9964 (0x26EC) Setting machine variables in the task sequencing environment. TSAgent 12/10/2019 7:07:41 AM 9964 (0x26EC) Retrieving DP Auth token from MP. TSAgent 12/10/2019 7:07:41 AM 9964 (0x26EC) SSL, using authenticator in request. TSAgent 12/10/2019 7:07:41 AM 9964 (0x26EC) signature varification failed TSAgent 12/10/2019 7:07:41 AM 9964 (0x26EC) Successfully retrieved Distribution Point auth token from Management Point TSAgent 12/10/2019 7:07:41 AM 9964 (0x26EC) Attempting to get active request. TSAgent 12/10/2019 7:07:41 AM 9964 (0x26EC) Getting Active request details . . . TSAgent 12/10/2019 7:07:41 AM 9964 (0x26EC) The handle for execution request is {1C7CE3F9-E27C-41E5-9A50-0C7E5C7AFA58} TSAgent 12/10/2019 7:07:41 AM 9964 (0x26EC) Saving access handle: {1C7CE3F9-E27C-41E5-9A50-0C7E5C7AFA58} TSAgent 12/10/2019 7:07:41 AM 9964 (0x26EC) The program ID for this request is * TSAgent 12/10/2019 7:07:41 AM 9964 (0x26EC) The package ID for this request is UCP00505 TSAgent 12/10/2019 7:07:41 AM 9964 (0x26EC) Saving Package ID: UCP00505, Program ID:* TSAgent 12/10/2019 7:07:41 AM 9964 (0x26EC) Getting member programs. TSAgent 12/10/2019 7:07:41 AM 964 (0x26EC) There are 1 member programs for this program. TSAgent 12/10/2019 7:07:41 AM 9964 (0x26EC) The package ID for this member program is Content_a9abe093-17d0-4e82-a266-9a984c30cdf9 TSAgent 12/10/2019 7:07:41 AM 9964 (0x26EC) The program ID for this member program is ScopeId_67BB9074-421B-4166-A053-A8090F9523EF/Application_5431b814-0c34-4c91-84d0-6abd9ce8d8c2 TSAgent 12/10/2019 7:07:41 AM 9964 (0x26EC) Found member application 'ScopeId_67BB9074-421B-4166-A053-A8090F9523EF/Application_5431b814-0c34-4c91-84d0-6abd9ce8d8c2' with Content Id 'Content_a9abe093-17d0-4e82-a266-9a984c30cdf9'. Skipping to store content location information. TSAgent 12/10/2019 7:07:41 AM 9964 (0x26EC) Successfully initialized Task Sequence environment. TSAgent 12/10/2019 7:07:41 AM 9964 (0x26EC) Successfully registered Task Sequence Progress UI. TSAgent 12/10/2019 7:07:42 AM 9964 (0x26EC) F:\_SMSTaskSequence does not exist TSAgent 12/10/2019 7:07:42 AM 9964 (0x26EC) Updated security on object F:\_SMSTaskSequence. TSAgent 12/10/2019 7:07:42 AM 9964 (0x26EC) Starting Task Sequence Manager Service. TSAgent 12/10/2019 7:07:42 AM 9964 (0x26EC) Task Sequencing Manager Service successfully started. TSAgent 12/10/2019 7:07:42 AM 9964 (0x26EC) Initializing the Task Sequence... TSAgent 12/10/2019 1:08:39 PM 8152 (0x1FD8) Waiting for TSManager service to stop. TSAgent 12/10/2019 1:08:39 PM 11584 (0x2D40) Waiting for TSManager service to stop. TSAgent 12/10/2019 1:08:49 PM 11584 (0x2D40) Waiting for TSManager service to stop. TSAgent 12/10/2019 1:08:59 PM 11584 (0x2D40) Waiting for TSManager service to stop. TSAgent 12/10/2019 1:09:09 PM 11584 (0x2D40) Waiting for TSManager service to stop. TSAgent 12/10/2019 1:09:19 PM 11584 (0x2D40) Waiting for TSManager service to stop. TSAgent 12/10/2019 1:09:29 PM 11584 (0x2D40) Waiting for TSManager service to stop. TSAgent 12/10/2019 1:09:39 PM 11584 (0x2D40) Waiting for TSManager service to stop. TSAgent 12/10/2019 1:09:49 PM 11584 (0x2D40) Waiting for TSManager service to stop. TSAgent 12/10/2019 1:09:59 PM 11584 (0x2D40) Waiting for TSManager service to stop. TSAgent 12/10/2019 1:10:09 PM 11584 (0x2D40) Waiting for TSManager service to stop. TSAgent 12/10/2019 1:10:19 PM 11584 (0x2D40) Waiting for TSManager service to stop. TSAgent 12/10/2019 1:10:29 PM 11584 (0x2D40) Waiting for TSManager service to stop. TSAgent 12/10/2019 1:10:39 PM 11584 (0x2D40) Waiting for TSManager service to stop. TSAgent 12/10/2019 1:10:49 PM 11584 (0x2D40) Waiting for TSManager service to stop. TSAgent 12/10/2019 1:10:59 PM 11584 (0x2D40) Waiting for TSManager service to stop. TSAgent 12/10/2019 1:11:09 PM 11584 (0x2D40) Waiting for TSManager service to stop. TSAgent 12/10/2019 1:11:19 PM 11584 (0x2D40) Waiting for TSManager service to stop. TSAgent 12/10/2019 1:11:29 PM 11584 (0x2D40) Task sequence launcher deployment failed!. Code 0x80070480 TSAgent 12/10/2019 1:11:39 PM 11584 (0x2D40) Cleaning up task sequence folder TSAgent 12/10/2019 1:11:39 PM 11584 (0x2D40) Unable to delete file \\?\F:\_SMSTaskSequence\TSEnv.dat (0x80070005). Continuing. TSAgent 12/10/2019 1:11:39 PM 11584 (0x2D40) Failed to delete directory 'F:\_SMSTaskSequence' TSAgent 12/10/2019 1:11:39 PM 11584 (0x2D40) SetNamedSecurityInfo() failed. TSAgent 12/10/2019 1:11:39 PM 11584 (0x2D40) SetObjectOwner() failed. 0x80070005. TSAgent 12/10/2019 1:11:39 PM 11584 (0x2D40) RemoveFile() failed for F:\_SMSTaskSequence\TSEnv.dat. 0x80070005. TSAgent 12/10/2019 1:11:39 PM 11584 (0x2D40) RemoveDirectoryW failed (0x80070091) for F:\_SMSTaskSequence TSAgent 12/10/2019 1:11:39 PM 11584 (0x2D40) Deleting volume ID file C:\_SMSTSVolumeID.7159644d-f741-45d5-ab29-0ad8aa4771ca ... TSAgent 12/10/2019 1:11:39 PM 11584 (0x2D40) Deleting volume ID file E:\_SMSTSVolumeID.7159644d-f741-45d5-ab29-0ad8aa4771ca ... TSAgent 12/10/2019 1:11:39 PM 11584 (0x2D40) Deleting volume ID file F:\_SMSTSVolumeID.7159644d-f741-45d5-ab29-0ad8aa4771ca ... TSAgent 12/10/2019 1:11:39 PM 11584 (0x2D40) Failed to delete registry value HKLM\Software\Microsoft\SMS\Task Sequence\Active Request Handle. Error code 0x80070002 TSAgent 12/10/2019 1:11:39 PM 11584 (0x2D40) Failed to delete registry value HKLM\Software\Microsoft\SMS\Task Sequence\Package. Error code 0x80070002 TSAgent 12/10/2019 1:11:39 PM 11584 (0x2D40) CTSAgent::Execute - Failed to launch Task Sequence manager. TSAgent 12/10/2019 1:11:39 PM 11584 (0x2D40)

    Thanks,

    Dom


    Security / System Center Configuration Manager Current Branch / SQL



    • Edited by Felyjos Wednesday, December 11, 2019 6:46 AM
    Tuesday, December 10, 2019 11:18 PM
  • Hi,

    The problem is a little complex. I will consult senior resource and do more research about this question, if there is any update, I will let you know. Thanks for your understanding.

    Best regards,
    Simon

    Please remember to mark the replies as answers if they help.
    If you have feedback for TechNet Subscriber Support, contact tnmff@microsoft.com.

    Thursday, December 12, 2019 9:52 AM
  • Thanks Simon,

    In the meantime do you know if there is a list of error code/message ID with their description...?

    10005

    10019

    11124

    etc....

    Thanks,
    Dom


    Security / System Center Configuration Manager Current Branch / SQL

    Thursday, December 12, 2019 5:57 PM
  • Hi Dom,

    Yes, here is a helpful article for your reference:
    what does this advertisement status message mean?

    10005  Running Program started
    10019  Expired Program expired
    11124  Running The task sequence execution engine started a group

    Thanks and regards,
    Simon

    Please remember to mark the replies as answers if they help.
    If you have feedback for TechNet Subscriber Support, contact tnmff@microsoft.com.

    Friday, December 13, 2019 2:46 AM